An asynchronous key agreement method and device for secure instant messaging

A key agreement and key technology, which is applied in digital transmission systems, data exchange networks, electrical components, etc., can solve the problems of no confidentiality at all before and after messages, protection keys being deciphered, and no secrecy at all.

Active Publication Date: 2019-01-04
成都三零瑞通移动通信有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] One is that the session key is not temporarily generated every time, but is calculated by the dot multiplication algorithm. This kind of session key is actually a fixed key, that is, for a certain client, the session key used by all messages at any time is the same , the hidden danger of this method is that once the session key of a certain message is cracked at a certain time, there is no confidentiality for all the previous and subsequent messages of the client; the other is that although the session key is temporarily generated each time, However, the protection key of the session key is actually a fixed key, that is, for a certain client, the session protection key used by all messages at any time is the same. The protection key of the session key of the message is deciphered, and all previous and subsequent messages for this client have no confidentiality at all
[0005] To sum up, the current key agreement protocols for real-time encrypted communication on the market, once the attacker masters these insecure devices, there is a risk of leaking or cracking the session key or the protection key of the session key. Or after cracking, the forward and backward security of the above-mentioned secure instant communication cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An asynchronous key agreement method and device for secure instant messaging
  • An asynchronous key agreement method and device for secure instant messaging
  • An asynchronous key agreement method and device for secure instant messaging

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0116] The asynchronous key agreement method includes four processes: an initial key agreement process, a key chain parent rolling process, a key chain child rolling process, and a session key protection key generation process. Before each real-time encrypted communication, the session key WK is temporarily generated, and then the key agreement is carried out according to the following three-step process:

[0117] Step 1: First execute the initial key agreement process to generate N_CC, and then execute the key chain parent roll process to generate N_CC and N_SC. The temporary public-private key pair used in the key chain parent rolling process in this step is the basic public-private key pair NB_SK / NB_PK for key negotiation.

[0118] Step 2: If the recipient is online, execute the key chain parent rolling process to generate new N_CC and N_SC. The temporary public-private key pair used in this key chain parent rolling process is temporarily generated each time, and the tempor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to the instant messaging field, particularly to an asynchronous key negotiation method and device aiming at secure instant messaging. Aiming at the problems existed in the prior art, this invention provides an asynchronous key negotiation method and device aiming at secure instant messaging; an instant messaging client performs key negotiation and exchange with the help of an instant messaging server directly; each interaction gets through the instant messaging server, and whether the instant messaging client is online or not is not sensitive; and thus, the asynchronous key negotiation is achieved. Simultaneously, since the method adopts a key rolling mechanism, a conversion temporary key and a protection key thereof are generated dynamically and updated in rolling; and thus, different messages use different conversion keys and protection keys thereof, so that the group messages can be protected and separated with each other by different keys among different uses in a same group.

Description

technical field [0001] The invention relates to the field of instant communication, in particular to an asynchronous key agreement method and device for secure instant communication. Background technique [0002] As a flexible modern communication method, instant messaging software brings great convenience to people, but also has great security risks. In order to solve the security problems of instant messaging, a variety of safe instant messaging software. In order to jointly establish a session key, secure instant messaging software needs to conduct key negotiation between two or more clients before communicating. Since instant messaging not only has the function of group communication, but also has the ability to send and receive offline messages, which makes The key negotiation of instant encrypted communication is different from other encrypted communication methods. The key negotiation of existing secure instant communication products can be divided into certificate t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/58
CPCH04L51/04H04L63/06H04L63/061
Inventor 张智邹伟何伟
Owner 成都三零瑞通移动通信有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products